Call us: 02045797300
Email us: info@trainingdeals.co.uk
For all your training needs.
Lines are open 24 Hours, Monday to Sunday

Certified Information Security Manager

CISM (Certified Information Security Manager) certification measures information security management experience and knowledge by focusing on 4 key job practice areas.
 
  • Our CISM training courses include everything required to pass the CISM exam and master the four Job Practice Areas
  • Boost your information security management career with a CISM qualification, the gold standard in information security management certification
  • CISM certification holders are highly respected for the skills and knowledge and are able to command high salaries
  • Enrol today for expert tuition from trusted CISM trainers with years of industry experience

 

Browse our list of upcoming courses below

Book Online or Call 0800 0353 257 to speak to a training advisor

Sorry, we do not have any courses matching your criteria

FAQs

  • What time shall I arrive at the venue?

    Please arrive at the venue for 08:45am

  • What are the pre-requisites?

    Candidates do not require any experience prior to attending the course.

  • What is the duration of the course?

    4 days

  • Do I need to bring anything with me to the course?

    Note pad and pen

  • How long until I receive the course confirmation details?

    Once your booking has been placed and confirmed, you will receive an email which contains your course location, course overview, pre-course reading material (if required), course agenda and payment receipts

  • What is the experience of the instructor(s) delivering my course?

    All of our instructors are fully accredited and have over ten years of experience

Overview

Introduction

This CISM Certified Information Security Manager course is for candidates looking to gain knowledge and skills over 4 days. This course will help candidates gain professional qualifications. Security management is for those working information security looking to gain new attributes.

Candidates will learn how to apply information risk management. The trainer will give candidates an insight in how communicate standards and procedures.

Pre-Requisites

  • Candidates do not require any experience prior to attending the course.

Who should attend?

  • This course should be attended by candidates interested in information systems management.

Course structure

  • Classroom training (4 days)
  • Exam is booked separately

What will you learn?                                          

  • How to apply information risk management
  • How to communicate standards and procedures
  • How to apply response management
  • How to apply documentation responses
  • How to develop recovery planning
  • How to develop security metrics

Exam structure

  • The exam is booked through ISACA
  • 200 multiple choice questions
  • Pass mark 450/800

Course Outline

Introduction

IT Governance and Management:

  • Governance structure
  • IT Organisation structures
  • Human resources
  • IT policies
  • Standards and procedures
  • Quality management system
  • Monitoring controls
  • Resource investment
  • Contracting strategies
  • Policies
  • Assurance practises
  • Business continuity plan

Information Security Program Development:

  • Program Alignment of Other Assurance Functions
  • Development of Information Security Architectures
  • Security Awareness
  • Training and Education
  • Communication and Maintenance of Standards
  •  Procedures
  • Documentations
  • Change Control
  • Lifecycle Activities
  • Security Metrics

Information Security Program Management:

  • Planning
  • Security Baselines
  • Business Processes
  • Security Program Infrastructure
  • Lifecycle Methodologies
  • Security Impact on Users
  • Accountability
  • Security Metrics
  • Managing Resources

Incident Management and Response:

  • Response Management
  • Response Management
  • Business Impact Analysis
  • Developing Response
  •  Recovery Plans
  • The Incident Response Process
  • Implementing Response and Recovery Plans
  • Response Documentation

Conclusion 

What's Included

  • Courseware Book
  • Certificate
  • Experienced instructor
  • Refreshments 

 

Testimonials

There hasn't been any testimonials submitted to this topic

Video

We do not currently have a video for this topic

Special Bundle Offers

Choose a learning package and
start learning today!

View deals

Onsite offers

Send us your onsite requirements and we will provide a tailor made course for you!

Contact

T.  02036038880
E: info@trainingdeals.co.uk

1 Bell Street, Maidenhead, Berkshire, SL6 1BU

Introduction

This CISM Certified Information Security Manager course is for candidates looking to gain knowledge and skills over 4 days. This course will help candidates gain professional qualifications. Security management is for those working information security looking to gain new attributes.

Candidates will learn how to apply information risk management. The trainer will give candidates an insight in how communicate standards and procedures.

Pre-Requisites

  • Candidates do not require any experience prior to attending the course.

Who should attend?

  • This course should be attended by candidates interested in information systems management.

Course structure

  • Classroom training (4 days)
  • Exam is booked separately

What will you learn?                                          

  • How to apply information risk management
  • How to communicate standards and procedures
  • How to apply response management
  • How to apply documentation responses
  • How to develop recovery planning
  • How to develop security metrics

Exam structure

  • The exam is booked through ISACA
  • 200 multiple choice questions
  • Pass mark 450/800

Course Outline

Introduction

IT Governance and Management:

  • Governance structure
  • IT Organisation structures
  • Human resources
  • IT policies
  • Standards and procedures
  • Quality management system
  • Monitoring controls
  • Resource investment
  • Contracting strategies
  • Policies
  • Assurance practises
  • Business continuity plan

Information Security Program Development:

  • Program Alignment of Other Assurance Functions
  • Development of Information Security Architectures
  • Security Awareness
  • Training and Education
  • Communication and Maintenance of Standards
  •  Procedures
  • Documentations
  • Change Control
  • Lifecycle Activities
  • Security Metrics

Information Security Program Management:

  • Planning
  • Security Baselines
  • Business Processes
  • Security Program Infrastructure
  • Lifecycle Methodologies
  • Security Impact on Users
  • Accountability
  • Security Metrics
  • Managing Resources

Incident Management and Response:

  • Response Management
  • Response Management
  • Business Impact Analysis
  • Developing Response
  •  Recovery Plans
  • The Incident Response Process
  • Implementing Response and Recovery Plans
  • Response Documentation

Conclusion